We are pleased to announce (most of) the speakers for ShmooCon 2020. We’re still waiting to get final confirmation from just a few folks, and we’ll share those names with you as soon as we do. Bios and abstracts are coming soon!
ONE TRACK MIND
- What if we had TLS for Phone Numbers? An introduction to SHAKEN/STIR – Kelley Robinson
- Reverse Engineering Apple’s BLE Continuity Protocol For Tracking, OS Fingerprinting, and Behavioral Profiling – Sam Teplov
- Robots and Privacy – Brittany Postnikoff
- Zoom 0-Day: How not to handle a vulnerability report – Jonathan Leitschuh
- Think of the Kitten: The truth about section 230, the law all the cute online cat pictures (and a lot of other good stuff) depends on – Cathy Gellis
- Moose v. Woodchuck – Samantha Livingston
BUILD IT
- Adventures in Hardware Hacking or Building Expensive Tools on a Budget – Zac Franken
- Knowing the UnFuzzed and Finding Bugs with Coverage Analysis – Mark Griffin
- A Wireless Journeyman’s Experience in Practical SIGINT – Russell Handorf
- The Verilog to Verilog Decompiler – Katie Liszewski
- Voight-Kampff for Email Addresses: Quantifying email address reputation to identify spear-phishing and fraud – Josh Kamdjou
- Whitelisting LD_PRELOAD for Fun and No Profit – Tony Lambert
- Privacy Scores for iOS Apps – Noelle Garrett
- Extracting an ELF from an ESP32 – Chris Lyne, Nick Miles
BUILD IT 20
- Chip Decapping on a Budget – Zach Pahle
- Banjo: An Android disassembler for Binary Ninja – Austin Ralls
- The Problem with Sandbox Solutions – Grant Seltzer Richman
BELAY IT
- Real World Zero Trust Implementation – Mark Loveless
- Command and KubeCTL: Real-world kubernetes security for pentesters – Mark Manning
- Vendors, and Risk, and Tigers, and Bears, Oh My: How to create a vendor review process from the ground up – Wendy Knox Everette
- Project Everest: Fast, correct, and secure software for deployment now! – Jonhathan Protzenko, Nikhil Swamy
- Anti-Forensics for Fun and Privacy – Alissa Gilbert
- Airplane Mode: Cybersecurity @ 30,000+ Feet – Olivia Stella
- Battling Supermutants in the Phishing Wasteland – Ashlee Benge, Zack Allen
BELAY IT 20
- Teen Hacks for Obfuscating Identity on Social Media – Russel Mosley, Samantha Mosely
- Software Mitigations for Hardware Vulnerabilities – Antonio Gomez
- SBOM: Screw it, we’ll do it live! – Allan Friedman, Audie
- Security Researcher OPSEC – Krassimir Tzvetanov
BRING IT ON
- Crossing the Border With Your Electronic Devices – Kurt Opsahl, Bill Budington
- The Hacker’s Guide to Cybersecurity Policy in 2020 – Jen Ellis, Nick Leiserson, Leonard Bailey, Kurt Opsahl
- Choose Your Own Adventure: Ransomware Response! – Heather Smith
- Hack the Stars – Yacko, Wacko, Dot
- The Cyberlous Mrs. Maisel: A Comedic (and slightly terrifying) Introduction to Information Warfare – J. Zhanna Malekos Smith, J.D.
- 5G Protocol Vulnerabilities and Exploits – Roger Piqueras Jover
- Hacking Democracy: On Securing an Election – Casey Ellis, Tod Beardsley, Kimber Dowsett, Jack Cable
- Playing the Short Game: The effects of data breaches on share prices – Chaim Sanders
BRING IT ON 20
- Face/Off: Action Plan for Perils & Privileges of Facial Recognition – Elizabeth Wharton, Suchi Pahi
- Using OSINT for Human Rights and Victim Support – Rae Baker
- Cisco SMB Products – Critical Vulnerablities / 0-day Release – Ken Pyle
- Resistance Isn’t Futile: A practical approach to prioritizing defenses with threat modeling – Katie Nickels